Analysis

  • max time kernel
    142s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2023, 08:14

General

  • Target

    c49c03e77064afb17321161be82eb471b52e872bdb0e1d93489e353a68182e5e.exe

  • Size

    1.2MB

  • MD5

    ff890a016713ee191d723bb7aa108e63

  • SHA1

    7ee8fa1aae5971c497d34f4a12da1c87cdc350a0

  • SHA256

    c49c03e77064afb17321161be82eb471b52e872bdb0e1d93489e353a68182e5e

  • SHA512

    34be0950a27ffc2c8faaaa3d7c4a54a9333f23cf68cef094f6d5348b82a154014c9e577ff86936b6cf3e7ed195be4a7660814e98c22c003fb54cfc160980ec22

  • SSDEEP

    24576:HayERURkqhI9erD91ItsZKbtEkua2XgcqfuM8gTtvo1pvY:HmUf29m6GZMtXufgvf78gTtvo

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Extracted

Family

amadey

Version

3.68

C2

31.41.244.200/games/category/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c49c03e77064afb17321161be82eb471b52e872bdb0e1d93489e353a68182e5e.exe
    "C:\Users\Admin\AppData\Local\Temp\c49c03e77064afb17321161be82eb471b52e872bdb0e1d93489e353a68182e5e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4912
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4696
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4552
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1080
              6⤵
              • Program crash
              PID:3264
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3016
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 1744
            5⤵
            • Program crash
            PID:3264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3500
      • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
        "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metafor.exe /TR "C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2148
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metafor.exe" /P "Admin:N"&&CACLS "metafor.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5975271bda" /P "Admin:N"&&CACLS "..\5975271bda" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5044
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metafor.exe" /P "Admin:N"
              5⤵
                PID:2288
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metafor.exe" /P "Admin:R" /E
                5⤵
                  PID:4916
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4624
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\5975271bda" /P "Admin:N"
                    5⤵
                      PID:448
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\5975271bda" /P "Admin:R" /E
                      5⤵
                        PID:1116
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 484
                  2⤵
                  • Program crash
                  PID:436
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 4552
                1⤵
                  PID:3976
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3016 -ip 3016
                  1⤵
                    PID:4196
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1820 -ip 1820
                    1⤵
                      PID:1948
                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                      C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                      1⤵
                      • Executes dropped EXE
                      PID:2004
                    • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                      C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe
                      1⤵
                      • Executes dropped EXE
                      PID:2160

                    Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                            Filesize

                            226KB

                            MD5

                            8627ebe3777cc777ed2a14b907162224

                            SHA1

                            06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                            SHA256

                            319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                            SHA512

                            9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                          • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                            Filesize

                            226KB

                            MD5

                            8627ebe3777cc777ed2a14b907162224

                            SHA1

                            06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                            SHA256

                            319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                            SHA512

                            9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                          • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                            Filesize

                            226KB

                            MD5

                            8627ebe3777cc777ed2a14b907162224

                            SHA1

                            06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                            SHA256

                            319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                            SHA512

                            9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                          • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                            Filesize

                            226KB

                            MD5

                            8627ebe3777cc777ed2a14b907162224

                            SHA1

                            06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                            SHA256

                            319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                            SHA512

                            9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                          • C:\Users\Admin\AppData\Local\Temp\5975271bda\metafor.exe

                            Filesize

                            226KB

                            MD5

                            8627ebe3777cc777ed2a14b907162224

                            SHA1

                            06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                            SHA256

                            319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                            SHA512

                            9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe

                            Filesize

                            226KB

                            MD5

                            8627ebe3777cc777ed2a14b907162224

                            SHA1

                            06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                            SHA256

                            319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                            SHA512

                            9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ge541952.exe

                            Filesize

                            226KB

                            MD5

                            8627ebe3777cc777ed2a14b907162224

                            SHA1

                            06eeed93eb3094f9d0b13ac4a6936f7088fbbdaa

                            SHA256

                            319b22945beeb7424fe6db1e9953ad5f2dc12cbba2fe24e599c3deda678893bb

                            SHA512

                            9de429300c95d52452caeb80c9d44ff72714f017319e416649c2100f882c394f5ab9f3876cc68d338f4b5a3cd58337defff9405be64c87d078edd0d86259c845

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe

                            Filesize

                            849KB

                            MD5

                            66d0cb456c74b345e15c79a8f3f11e65

                            SHA1

                            cd28de2f6ecdba3358fc31790e0e0799bda2fda9

                            SHA256

                            d1bab3c2822a373acd5d2fe05efe85531cae1b39e1229a03e7cec99d10f16221

                            SHA512

                            21e4f6dea1bd0157b30e7e50f1fd6025b2bb04e044b63f781d986a37734c9810ef3e1cfa763ad8b6ce33f07d3b4e6c0e28cbb9c585076f36ebb659d3fbdeaf91

                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2410.exe

                            Filesize

                            849KB

                            MD5

                            66d0cb456c74b345e15c79a8f3f11e65

                            SHA1

                            cd28de2f6ecdba3358fc31790e0e0799bda2fda9

                            SHA256

                            d1bab3c2822a373acd5d2fe05efe85531cae1b39e1229a03e7cec99d10f16221

                            SHA512

                            21e4f6dea1bd0157b30e7e50f1fd6025b2bb04e044b63f781d986a37734c9810ef3e1cfa763ad8b6ce33f07d3b4e6c0e28cbb9c585076f36ebb659d3fbdeaf91

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe

                            Filesize

                            175KB

                            MD5

                            795f3fe5687db9b19853eaf6acdc389a

                            SHA1

                            cd1ba862909c58a01d3a8e44c29cb71bb6b50630

                            SHA256

                            448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

                            SHA512

                            d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\en832526.exe

                            Filesize

                            175KB

                            MD5

                            795f3fe5687db9b19853eaf6acdc389a

                            SHA1

                            cd1ba862909c58a01d3a8e44c29cb71bb6b50630

                            SHA256

                            448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

                            SHA512

                            d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe

                            Filesize

                            707KB

                            MD5

                            6a1aeef51bec135392e6f022da1d296e

                            SHA1

                            0d3fed7d43397b38654d7069805a3c5ae7235b50

                            SHA256

                            3e5bfbe659030da01f72b26f5903b48c07cb861a4f2b4f5bf7ca465a93354718

                            SHA512

                            911a8f951ee4367c028dcd24f88c2b27a5efed827c69cfda860098a4f36961a0a2342cd117e4980ea1581adcb7cbf4a6fde3c19e5f6caef9f12ce6188e082476

                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino8706.exe

                            Filesize

                            707KB

                            MD5

                            6a1aeef51bec135392e6f022da1d296e

                            SHA1

                            0d3fed7d43397b38654d7069805a3c5ae7235b50

                            SHA256

                            3e5bfbe659030da01f72b26f5903b48c07cb861a4f2b4f5bf7ca465a93354718

                            SHA512

                            911a8f951ee4367c028dcd24f88c2b27a5efed827c69cfda860098a4f36961a0a2342cd117e4980ea1581adcb7cbf4a6fde3c19e5f6caef9f12ce6188e082476

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe

                            Filesize

                            399KB

                            MD5

                            f2666c6b6ec3dc3b712fa1740aa136ad

                            SHA1

                            9f27869e178c08574f07a02da937e3a05726c40f

                            SHA256

                            6263b835e13df2591f5fa9a5dcfe7915e6b03beb7ab24f1c23130d6680005bc2

                            SHA512

                            de132f03c2d50aa36ba7dd1b55c888a508a9ac3c4c71dc834bb1134e68f07270ea638d886fc8726038d2c341f8ca165017e88bf91214ac7e6b265771f0155e10

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlz62s30.exe

                            Filesize

                            399KB

                            MD5

                            f2666c6b6ec3dc3b712fa1740aa136ad

                            SHA1

                            9f27869e178c08574f07a02da937e3a05726c40f

                            SHA256

                            6263b835e13df2591f5fa9a5dcfe7915e6b03beb7ab24f1c23130d6680005bc2

                            SHA512

                            de132f03c2d50aa36ba7dd1b55c888a508a9ac3c4c71dc834bb1134e68f07270ea638d886fc8726038d2c341f8ca165017e88bf91214ac7e6b265771f0155e10

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe

                            Filesize

                            350KB

                            MD5

                            9a0d0cdf9917564da2326c3353038e97

                            SHA1

                            25af8e2f1996f25111287fa120fd4d8cb43662fc

                            SHA256

                            c24710e640815047f624ca76d2fdb74243cf55438928b50b97d69fa0e9967882

                            SHA512

                            88e2ef1287c2cf3ef444967ab36d4f51681d1723471154f5104e7bf4b93b3184b00a2719b884eb56e54986b8dddcb46a0f2eb2bf625e8d91c167a5d85fb9a870

                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino0396.exe

                            Filesize

                            350KB

                            MD5

                            9a0d0cdf9917564da2326c3353038e97

                            SHA1

                            25af8e2f1996f25111287fa120fd4d8cb43662fc

                            SHA256

                            c24710e640815047f624ca76d2fdb74243cf55438928b50b97d69fa0e9967882

                            SHA512

                            88e2ef1287c2cf3ef444967ab36d4f51681d1723471154f5104e7bf4b93b3184b00a2719b884eb56e54986b8dddcb46a0f2eb2bf625e8d91c167a5d85fb9a870

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe

                            Filesize

                            11KB

                            MD5

                            7e93bacbbc33e6652e147e7fe07572a0

                            SHA1

                            421a7167da01c8da4dc4d5234ca3dd84e319e762

                            SHA256

                            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                            SHA512

                            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus8532.exe

                            Filesize

                            11KB

                            MD5

                            7e93bacbbc33e6652e147e7fe07572a0

                            SHA1

                            421a7167da01c8da4dc4d5234ca3dd84e319e762

                            SHA256

                            850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                            SHA512

                            250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe

                            Filesize

                            342KB

                            MD5

                            8bc9c57aa0937fa5e4e00e3f102dbfc2

                            SHA1

                            7da0642ebb39df07779b0ae6bd1aeb46cfa1c8f8

                            SHA256

                            cc5243958b10b02874dee327d7c5c4b1b1561057395622b2c6ada34b3bfdedb1

                            SHA512

                            de2527ae56fc567dfa6d2bb4215bcce0f64ec721f791c3c77de0a16ed029df5693eb7e5b6ec7888e278ec221738e592088bbd2cf14d3eef3c139a11952dda1d4

                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\con1154.exe

                            Filesize

                            342KB

                            MD5

                            8bc9c57aa0937fa5e4e00e3f102dbfc2

                            SHA1

                            7da0642ebb39df07779b0ae6bd1aeb46cfa1c8f8

                            SHA256

                            cc5243958b10b02874dee327d7c5c4b1b1561057395622b2c6ada34b3bfdedb1

                            SHA512

                            de2527ae56fc567dfa6d2bb4215bcce0f64ec721f791c3c77de0a16ed029df5693eb7e5b6ec7888e278ec221738e592088bbd2cf14d3eef3c139a11952dda1d4

                          • memory/1820-164-0x0000000000400000-0x0000000000941000-memory.dmp

                            Filesize

                            5.3MB

                          • memory/1820-134-0x00000000026B0000-0x00000000027B3000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/3016-1127-0x0000000007F10000-0x0000000007F22000-memory.dmp

                            Filesize

                            72KB

                          • memory/3016-1135-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                            Filesize

                            64KB

                          • memory/3016-1142-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                            Filesize

                            64KB

                          • memory/3016-1139-0x000000000A910000-0x000000000A960000-memory.dmp

                            Filesize

                            320KB

                          • memory/3016-1138-0x000000000A880000-0x000000000A8F6000-memory.dmp

                            Filesize

                            472KB

                          • memory/3016-1137-0x000000000A0B0000-0x000000000A5DC000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/3016-1136-0x0000000009EE0000-0x000000000A0A2000-memory.dmp

                            Filesize

                            1.8MB

                          • memory/3016-1134-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                            Filesize

                            64KB

                          • memory/3016-1132-0x00000000082C0000-0x0000000008326000-memory.dmp

                            Filesize

                            408KB

                          • memory/3016-1131-0x0000000008220000-0x00000000082B2000-memory.dmp

                            Filesize

                            584KB

                          • memory/3016-1129-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                            Filesize

                            64KB

                          • memory/3016-1128-0x0000000007F30000-0x0000000007F6C000-memory.dmp

                            Filesize

                            240KB

                          • memory/3016-1126-0x0000000007DD0000-0x0000000007EDA000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/3016-1125-0x0000000007780000-0x0000000007D98000-memory.dmp

                            Filesize

                            6.1MB

                          • memory/3016-248-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-246-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-244-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-242-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-215-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-216-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-217-0x0000000002E10000-0x0000000002E5B000-memory.dmp

                            Filesize

                            300KB

                          • memory/3016-219-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                            Filesize

                            64KB

                          • memory/3016-221-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-223-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                            Filesize

                            64KB

                          • memory/3016-224-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-220-0x0000000004AF0000-0x0000000004B00000-memory.dmp

                            Filesize

                            64KB

                          • memory/3016-226-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-228-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-230-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-232-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-234-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-236-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-238-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3016-240-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

                            Filesize

                            248KB

                          • memory/3244-1147-0x0000000000F80000-0x0000000000FB2000-memory.dmp

                            Filesize

                            200KB

                          • memory/3244-1148-0x0000000005880000-0x0000000005890000-memory.dmp

                            Filesize

                            64KB

                          • memory/4552-205-0x0000000000400000-0x0000000002B1A000-memory.dmp

                            Filesize

                            39.1MB

                          • memory/4552-171-0x0000000007280000-0x0000000007824000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4552-209-0x0000000007270000-0x0000000007280000-memory.dmp

                            Filesize

                            64KB

                          • memory/4552-207-0x0000000007270000-0x0000000007280000-memory.dmp

                            Filesize

                            64KB

                          • memory/4552-185-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-189-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-203-0x0000000007270000-0x0000000007280000-memory.dmp

                            Filesize

                            64KB

                          • memory/4552-202-0x0000000007270000-0x0000000007280000-memory.dmp

                            Filesize

                            64KB

                          • memory/4552-201-0x0000000007270000-0x0000000007280000-memory.dmp

                            Filesize

                            64KB

                          • memory/4552-200-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

                            Filesize

                            180KB

                          • memory/4552-183-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-193-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-208-0x0000000007270000-0x0000000007280000-memory.dmp

                            Filesize

                            64KB

                          • memory/4552-197-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-195-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-181-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-187-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-179-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-210-0x0000000000400000-0x0000000002B1A000-memory.dmp

                            Filesize

                            39.1MB

                          • memory/4552-191-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-177-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-175-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-173-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-172-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4552-199-0x0000000004A70000-0x0000000004A82000-memory.dmp

                            Filesize

                            72KB

                          • memory/4696-166-0x000000001C1E0000-0x000000001C32E000-memory.dmp

                            Filesize

                            1.3MB

                          • memory/4696-163-0x0000000000130000-0x000000000013A000-memory.dmp

                            Filesize

                            40KB